2009 v. 2017 in Cybersecurity: Comparing Recommendations for 44th and 45th Presidencies from The Center for Strategic and International Studies

The Center for Strategic and International Studies (CSIS) produced a cybersecurity agenda in December 2008 for the 44th Presidency (CSIS:44) and built on that to produce a report in January of 2017 for the 45th Presidency (CSIS:45).  What follows is a high-level overview of each (a future post will compare/contrast the two reports).

 

 

 

 

Key elements/recommendations from the CSIS:44 report:

  • The need to create a comprehensive national security strategy focused on cyberspace
  • Authority: the need for leadership to flow outward and downward from the White House
  • Enhanced cybersecurity through public/private partnerships
  • Standards and regulations drafted and applied to the realm of cyber
  • The underpinnings of trusted identities for authentication and authorization balanced against privacy interests
  • Legislative updates that address current and future needs and based on a technology-centric approach rather than applying pre-existing, outmoded legislation to cyber issues
  • Security through acquisition: mandating that purchases leverage secure computing environments (both hardware and software)
  • Long-term outlook: training, research, and education to develop leadership and personnel able to face domestic and international cyber issues
  • Build on what exists rather than re-inventing the wheel: take advantage of the Comprehensive National Cybersecurity Initiative (CNCI) and expand upon it

Key elements/recommendations from the CSIS:45 report.  The focus here is on three overarching areas:

  1. Policy-based Recommendations
    • Revise the international cybersecurity strategy – the world has become much more cyber-centric since 2009 and an international strategy must be developed to meet the current and future realities
    • A two-pronged approach may be needed:
      • One strategy for dealing with nations with similar goals;
      • An independent strategy to enter agreements with authoritarian regimes
    • Expand deterrent capabilities: cyber, kinetic, and economic countermeasures
    • Enhanced international cooperation to prosecute cyber crime
    • Data Protection, Privacy and Cybersecurity:
      • Liaise with the private sector to develop a set of best practices which address commercial data collection and data privacy expectations including issues where physical and digital information is co-mingled
      • Task the National Institutes of Standards and Technology (NIST) in conjunction with the private sector to update the definition of personally identifiable information (PII)
      • NIST shall develop a set of recommended data security practices and standards (a baseline approach); and delineate generally accepted standards of care to be applied to data
      • Develop a national data breach law
      • Request that Congress amend the FTC to create a division of data protection
    • Increased transparency for Cyber Incidents: need to encourage the use and dissemination of information related to cyber attacks and to allow entities to do this anonymously and in the absence of liability.
    • The Internet of Things (IoT): recommend classifying IoT devices similar to the National Highway Traffic Safety Administration’s (NHTSA) crash tests – a rating based on their security ratings
    • Encryption Policy: encourage the adoption of strong encryption while creating conditions and processes for lawfully gaining access to encrypted material from the private sector
    • Active Defense: help the private sector extend their security posture outside traditional perimeter defenses; requires active coordination with law enforcement both domestically and internationally
    • NIST Framework: just as critical infrastructure has done; other industries should also look to the NIST framework for general guidance on methods and processes to improve overall security.
    • Raise the Costs of Attacks
      • Ensure that stolen credentials are more difficult to trade and thus their value will be decreased
      • Move to a multi-factor authentication model across the board
      • Develop effective counter-measures against botnet attacks, specifically with the rise in IoT devices
    • Military role: acknowledge the separation of duties between the military and civilian components and yet develop and enhance partnerships so that Cyber Command and Strategic Command are able to operate cohesively should a cyber situation arise
      • Leverage the National Guard and Reserves in the context of state (Title 32) or Federal (Title 10 and 50) deployments in response to cyber events.
  1. Organization
    • Create a Cybersecurity Coordinator, appoint someone and ensure they have the requisite authority as an assistant to the president.
    • Continue to build-out DHS:
      • Provide DHS with an actual cyber mission to become point on cyber
      • Carve out a separate, independent organizational component within DHS whose sole focus is cybersecurity
      • Elevate cyber positions/roles within other agencies as well to establish clear point persons and lines of communication within and amongst the government
      • Government Accountability Office (GAO) should have review capability to assess cybersecurity and to perform cyber assessments
      • Increase efficiency of Congressional oversight: reduce number of DHS committees to centralize congressional jurisdiction over cyber and homeland security
  1. Resources
    • Zero Vulnerability Programs: these are critical underpinnings to enhance software and to discover issues; thus ensuring that zero-day research is lawful will ensure that researchers can continue this vital work.
    • Increased reliance on Cloud services and Outsourcing: for smaller agencies/departments there may be benefits to outsourcing IT and gaining increased security. Contracting with providers may reduce exposure and allow providers to specialize in IT and cybersecurity rather than forcing federal agencies to develop this expertise in-house.
    • Cybersecurity Workforce: given the current shortage of properly trained cybersecurity professionals a model must be developed to create a pipeline of persons through education and training that can be utilized in the cybersecurity context. It will be important to develop models that include cyber education as early as elementary schools.

Tags:

Leave a Reply

You must be logged in to post a comment.

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. She is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories